• 제목/요약/키워드: Computer usage

검색결과 1,243건 처리시간 0.029초

다단 회로에서 테스트 불가능한 경로 검출을 위한 효율적인 알고리듬의 설계 (Design of an efficient algorithm for the detection of untestable paths in multi-level circuits)

  • 허훈;황선영
    • 전자공학회논문지C
    • /
    • 제34C권3호
    • /
    • pp.11-22
    • /
    • 1997
  • This paper presents the design and implementation of an efficient algorithm for detecting untestable paths in multi-level circuits. Transforming multi-level circuit into a multiplexor-based one through BDD(binary decision diagram)construction, the proposed algorithm detects untestable paths in the transformed circuits. By constructing ENF (equivalent normal form) only for reconvergent paths, the proposed system detects and removes untestable paths efficiently in terms of the run-time and memory usage. Experimental results for MCNC/ISCAS benchmark circuits show that the system efficiently detects and removes untestable paths. The run-time and memory usage have been reduced by 37.7% and 60/9%, respectively, comapred to the previous methods.

  • PDF

부분 유료 온라인 게임에서 처음 결제시기와 게임 이용기간의 상관관계에 관한 연구 (A Study on the Correlation between Paying Time and Game Usage Period in Partially Paid Online Game)

  • 신유빈;배은채;김영원;황성준;이종원;신대영
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2018년도 제58차 하계학술대회논문집 26권2호
    • /
    • pp.87-88
    • /
    • 2018
  • 본 연구는 부분유료온라인 게임에서 유저의 게임 이용 기간과 처음 결제 시기간의 상관관계의 검증을 통해 점차 중요도가 높아지고 있는 게임 이용 기간에 대한 요소로서 처음 결제 시기가 적절한지를 알아보았다. 게임 이용 기간과 처음 결제 시기의 상관관계를 검증하기 위해 설문으로 데이터를 수집하고, 회귀분석을 실행하였고 처음 결제 시기가 게임 이용 기간에 양적인 방향으로 영향을 끼치는 요소임을 확인하였다.

  • PDF

Electronic Proceedings in Modern Legal Conditions

  • Veselovska, Nataliia;Slipeniuk, Vasyl;Yasynok, Dmytro;Zhukevych, Ihor;Gorbenko, Arina
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.224-228
    • /
    • 2021
  • The article is devoted to the problems and prospects of integration of informational technologies in the administration of justice as a necessary component of the development of the informational society in Ukraine. In general, informational technologies make it possible to create new forms of organization and interaction of bodies of public authorities with society, to introduce innovative solutions for legal regulation and organization of public relations. More and more services for citizens are moving to electronic format. Judicial reform is aimed at ensuring more comfortable and convenient interaction with the courts. The need for the usage of informational technology in the proceedings is preconditioned by the global informatization of modern society, the development of new forms of interaction in the civil sphere with the usage of electronic means of communication: the global Internet, mobile, and satellite communication systems and more. "Electronic justice" involves the use of information and communication technologies in the implementation of procedural law.

청소년 SNS 이용동기에 미치는 영향 연구 (An Study for Effects of Adolescents on SNS' Usage Motivation)

  • 이새봄;문재영
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2019년도 제59차 동계학술대회논문집 27권1호
    • /
    • pp.197-198
    • /
    • 2019
  • 본 연구는 청소년들의 SNS 이용동기와 이용실태를 알아보고자 하였다. 연구를 위해 부산에 살고 있는 고등학생들을 대상으로 조사를 실시하였으며, 사회적 동기, 유희적 동기, 기능적 동기, 심리적 동기, 정보공유, 탈출욕구, 교우실현, 전문적 혜택 등에 대한 설문문항을 토대로 설문조사를 진행하였다. 설문 결과, 대부분의 학생들이 페이스북을 사용하고 있었으며, 그 다음으로 인스타그램을 많이 이용하는 것으로 나타났다. 그리고 청소년들은 기능적 동기와 유희적 동기와 교유관계 유지를 위한 동기 때문에 SNS를 이용하고 있는 것으로 나타났다. 현재 청소년들이 SNS를 활발히 활용하고 있고 왜 이용하고 있는지에 대한 동기를 파악하여 청소년들의 심리상태를 점검해 볼 수 있다는 차원에서 연구의 의의가 있다고 볼 수 있다.

  • PDF

Security Determinants of the Educational Use of Mobile Cloud Computing in Higher Education

  • Waleed Alghaith
    • International Journal of Computer Science & Network Security
    • /
    • 제24권9호
    • /
    • pp.50-62
    • /
    • 2024
  • The decision to integrate mobile cloud computing (MCC) in higher education without first defining suitable usage scenarios is a global issue as the usage of such services becomes extensive. Consequently, this study investigates the security determinants of the educational use of mobile cloud computing among universities' students. This study proposes and develops a theoretical model by adopting and modifying the Protection Motivation Theory (PMT). The study's findings show that a significant amount of variance in MCC adoption was explained by the proposed model. MCC adoption intention was shown to be highly influenced by threat appraisal and coping appraisal factors. Perceived severity alone explains 37.8% of students "Intention" to adopt MCC applications, which indicates the student's perception of the degree of harm that would happen can hinder them from using MCC. It encompasses concerns about data security, privacy breaches, and academic integrity issues. Response cost, perceived vulnerability and response efficacy also have significant influence on students "intention" by 18.8%, 17.7%, and 6.7%, respectively.

Security Determinants of the Educational Use of Mobile Cloud Computing in Higher Education

  • Waleed Alghaith
    • International Journal of Computer Science & Network Security
    • /
    • 제24권8호
    • /
    • pp.105-118
    • /
    • 2024
  • The decision to integrate mobile cloud computing (MCC) in higher education without first defining suitable usage scenarios is a global issue as the usage of such services becomes extensive. Consequently, this study investigates the security determinants of the educational use of mobile cloud computing among universities students. This study proposes and develops a theoretical model by adopting and modifying the Protection Motivation Theory (PMT). The studys findings show that a significant amount of variance in MCC adoption was explained by the proposed model. MCC adoption intention was shown to be highly influenced by threat appraisal and coping appraisal factors. Perceived severity alone explains 37.8% of students "Intention" to adopt MCC applications, which indicates the student's perception of the degree of harm that would happen can hinder them from using MCC. It encompasses concerns about data security, privacy breaches, and academic integrity issues. Response cost, perceived vulnerability and response efficacy also have significant influence on students "intention" by 18.8%, 17.7%, and 6.7%, respectively.

컴퓨터 윤리에 관한 연구 (Computer Ethics in Computer Education)

  • 주영주;이광희
    • 정보교육학회논문지
    • /
    • 제1권2호
    • /
    • pp.84-100
    • /
    • 1997
  • All technology has both intended and unintended effects, we have said, and information technology is no exception. Information technology offers a number of challenges: those of computer education, computer literacy, the ethical and societal impacts of computing and communication systems. Current computer education focuses primarily on the history, parts and usage of a computer, and programming, it does not fully include the moral standards or ethics that help guide behavior and conduct for citizens of Information society. The purpose of this study is to review of the theoretical issues and societal impacts of computers, communication systems and computer ethics; then, to nalyse current curriculum and content of school computer education in Korea: finally, to develop a possible course in computer ethics containing a goal statement and aspects of computer literacy. Contents in computer ethics covers issues of nettiquette, privacy, health, copyright-related software and network piracy, computer crime and viruses. Six suggestions are made for the computer ethics of Information Age in the conclusion.

  • PDF

Automated Alignment in Multilingual Corpora

  • Campbell, J.A.;Fang, Alex Chengyu
    • 한국언어정보학회:학술대회논문집
    • /
    • 한국언어정보학회 1995년도 Language, Information and Computation = Proceedings of the 10th Pacific Asia Conference, Hong Kong
    • /
    • pp.185-194
    • /
    • 1995
  • PDF

저작물 이용권한 명세를 위한 ODRL 확장 모델 및 프로토타입 설계 (ODRL Ontology Extention Model and Prototype Design for the Specification of the Rights to use Digital Contents)

  • 김정민;정현숙
    • 융합정보논문지
    • /
    • 제10권1호
    • /
    • pp.13-21
    • /
    • 2020
  • 인터넷 기술 및 디지털 콘텐츠 편집 소프트웨어의 발전으로 인해 점점 많은 수의 1인 미디어 창작자(크리에이터)들이 다양한 콘텐츠들을 생산하고 공유하고 있다. 그러나 1인 미디어 활성화를 위해서는 콘텐츠의 사용, 판매, 편집, 재가공 등 다양한 거래 유형별 이용권한(라이선스) 생성과 함께 콘텐츠 사용 모니터링, 라이선스 거래 추적 등의 핵심 기술이 1인 미디어 플랫폼에서 지원되어야 한다. 본 논문에서는 ODRL(Open Digital Rights Language) 온톨로지(ontology)에 기반하여 다양한 수준의 디지털 콘텐츠 이용권한 및 이용추적을 명세할 수 있는 Policy 클래스 확장 모델을 정의하고 모델의 성능을 평가하기 위한 사용자 인터페이스 프로토타입을 구현하였다. 본 논문의 제안 모델은 개인 창작물 공유 플랫폼의 라이선스 관리 모듈 구현의 핵심 요소로 참조될 수 있다.